observability team mailing list archive
-
observability team
-
Mailing list archive
-
Message #00008
Re: Fwd: [Ubuntu-docker-images] CVEs potentially affecting cortex and telegraf
Sounds good to me. @Emilia Torino <emilia.torino@xxxxxxxxxxxxx> do you need
those repos to exist in Docker Hub before you can onboard these?
On Fri, Jun 9, 2023 at 10:42 AM Luca Bello <luca.bello@xxxxxxxxxxxxx> wrote:
> Hello everyone,
>
> as mentioned before, the ROCKs we have are all based on upstream projects;
> the list is the following, as required:
>
> * Alertmanager (https://github.com/prometheus/alertmanager)
> * Grafana Agent (https://github.com/grafana/agent)
> * Grafana (https://github.com/grafana/grafana)
> * Loki (https://github.com/grafana/loki)
> * Mimir (https://github.com/grafana/mimir)
> * SeaweedFS (https://github.com/seaweedfs/seaweedfs)
> * Traefik (https://github.com/traefik/traefik)
>
> Please let me know if any of these qualifies!
>
>
> Cheers,
>
> Luca
> On 31/05/2023 18:29, Cristovao Cordeiro wrote:
>
> So the only change from our side will be to add
>> prometheus to the email notification subject (or I guess we can just
>> simple replace it with "CVEs potentially affecting upstream based
>> ROCKs"). Are the email recipients the same ones for the other ones?
>
>
> I think that would be fine for now. I'm reluctant to use the mailing list
> as a catch-all, but I think we can re-design this once there is an event
> bus at Canonical, so we rely less on emails.
>
> As for the other 10 ROCKs, @Luca Bello <luca.bello@xxxxxxxxxxxxx> let's
> first do the right due diligence on those, cause if a ROCK is not meant to
> be under the "ubuntu" namespace, then this security monitoring doesn't need
> to apply.
>
> On Wed, May 31, 2023 at 3:58 PM Emilia Torino <emilia.torino@xxxxxxxxxxxxx>
> wrote:
>
>>
>> Hi all,
>>
>> On 31/5/23 04:03, Luca Bello wrote:
>> > Hi everyone,
>> >
>> > as said in the thread already, the prometheus image is indeed a ROCK
>> > based on the *prometheus/prometheus* repository.
>>
>> That's very convenient. But just to be clear again, we are not
>> "inspecting" the upstream based rocks the same way we do for the deb
>> based ones. We are only monitoring new CVEs created for prometheus,
>> protobuf and consul. So the only change from our side will be to add
>> prometheus to the email notification subject (or I guess we can just
>> simple replace it with "CVEs potentially affecting upstream based
>> ROCKs"). Are the email recipients the same ones for the other ones?
>>
>> >
>> > We're in the process of updating all of our ROCKs in a similar way,
>> > meaning we want to make sure we are complying with any guidelines you
>> > might have on them.
>> > We have about 10 ROCKs at the moment, mostly based on upstream projects
>> > just like this one. Should I share the full list, so you can track them?
>>
>> I am happy to do an analysis of this list to see if we can add more. The
>> short answer would be that if the software is packaged as a deb in main
>> or universe (which is the situation for prometheus, protobuf and consul)
>> then we can simply add them. This is because the service is based on the
>> existing CVE triage work the security team does, which is mainly for
>> debs (although now is being extended to other ecosystems because of SOSS
>> but it is still limited and mainly supporting NVIDIA software).
>>
>> A simple improvement though could be to map the projects to the rocks so
>> you dont get a general notification, but one per ROCK as the USNs/debs
>> based service does. We can work on adding this for the next cycle.
>>
>> >
>> >
>> > Cheers,
>> >
>> > Luca
>> >
>> >
>> > On 31/05/2023 08:12, Cristovao Cordeiro wrote:
>> >> Thank you for the swift action, Emilia!
>> >>
>> >> > Does this
>> >> > relate to a question being asked some hours ago in
>> >> > ~Security
>> >> https://chat.canonical.com/canonical/pl/dchhoa7wxtyiper7rbk8h43mjo?
>> >>
>> >> Yes, precisely. @Luca Bello <mailto:luca.bello@xxxxxxxxxxxxx> is in
>> >> the process of updating that image and we're re-doing our due
>> diligence.
>> >> Luca can confirm, but this seems to be a ROCK based precisely on that
>> >> upstream Prometheus repository that you are already monitoring
>> >> (
>> https://github.com/canonical/prometheus-rock/blob/main/rockcraft.yaml#L19
>> ).
>> >>
>> >> Can we then add this image to your list of tracked ROCKs?
>> >>
>> >>
>> >> On Tue, May 30, 2023 at 9:45 PM Emilia Torino
>> >> <emilia.torino@xxxxxxxxxxxxx> wrote:
>> >>
>> >> Hey all,
>> >>
>> >> On 30/5/23 13:14, Emilia Torino wrote:
>> >> > Hi Cristovao,
>> >> >
>> >> > On 30/5/23 09:41, Cristovao Cordeiro wrote:
>> >> >> Hi Emilia,
>> >> >>
>> >> >> could you please confirm the `prometheus` container image is
>> being
>> >> >> monitored?
>> >> >
>> >> > I don't see prometheus being monitored by our services (not as a
>> >> rock
>> >> > based on upstream source code nor as a rock based on debs). Does
>> >> this
>> >> > relate to a question being asked some hours ago in
>> >> > ~Security
>> >> https://chat.canonical.com/canonical/pl/dchhoa7wxtyiper7rbk8h43mjo
>> ?
>> >> >
>> >> >
>> >> > These emails' subject only mentions cortex and telegraf, but
>> >> >> I can see "https://github.com/prometheus/prometheus
>> >> >> <https://github.com/prometheus/prometheus>" in the body of the
>> >> email.
>> >> >
>> >> > Apologize for the confusion, this sounds like a bug in the email
>> >> content
>> >> > generator code. I will take a look at it later.
>> >>
>> >> I investigated this bug and it should be solved already. There was
>> an
>> >> issue in the past, but we fixed it already. I thought it could be
>> >> related but I see this notification you are asking is from March.
>> >> If you
>> >> check the last notification sent on Thu, May 4, 2:03 AM is
>> correctly
>> >> reporting about a single package (cortex only).
>> >>
>> >> Let me know if you have any further question.
>> >>
>> >> In this case, only a new
>> >> > CVE affecting consul has been created in our tracker
>> >> >
>> >>
>> https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845.
>> >> >
>> >> > Still, this does not mean cortex and telegraf are affected,
>> >> since this
>> >> > needs triage (i.e. understand if the code/version present in the
>> >> rocks
>> >> > are indeed vulnerable).
>> >> >
>> >> > FYI the reason why https://github.com/prometheus/prometheus (and
>> >> also
>> >> > https://github.com/gogo/protobuf) are listed in this email, is
>> >> because
>> >> > these 3 are the *only* upstream projects we are monitoring
>> >> (because of
>> >> > the bug the 3 are incorrectly listed in the email, only consul
>> >> should
>> >> > be). In other words, we are not scanning every upstream source
>> >> project
>> >> > which is used to build cortex and telegraf.
>> >> >
>> >> > There are reasons why this service is very limited, and I hope
>> this
>> >> > is/was clear. Let me know if you need more information.
>> >> >
>> >> > Emilia
>> >> >
>> >> >
>> >> >>
>> >> >> ---------- Forwarded message ---------
>> >> >> From: <security-team-toolbox-bot@xxxxxxxxxxxxx
>> >> >> <mailto:security-team-toolbox-bot@xxxxxxxxxxxxx>>
>> >> >> Date: Sat, Mar 11, 2023 at 6:03 AM
>> >> >> Subject: [Ubuntu-docker-images] CVEs potentially affecting
>> >> cortex and
>> >> >> telegraf
>> >> >> To: <ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx
>> >> >> <mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx>>,
>> >> >> <sergio.durigan@xxxxxxxxxxxxx
>> >> <mailto:sergio.durigan@xxxxxxxxxxxxx>>,
>> >> >> <emilia.torino@xxxxxxxxxxxxx
>> >> <mailto:emilia.torino@xxxxxxxxxxxxx>>,
>> >> >> <alex.murray@xxxxxxxxxxxxx <mailto:alex.murray@xxxxxxxxxxxxx>>,
>> >> >> <simon.aronsson@xxxxxxxxxxxxx
>> >> <mailto:simon.aronsson@xxxxxxxxxxxxx>>,
>> >> >> <dylan.stephano-shachter@xxxxxxxxxxxxx
>> >> >> <mailto:dylan.stephano-shachter@xxxxxxxxxxxxx>>
>> >> >>
>> >> >>
>> >> >> New CVEs affecting packages used to build upstream based rocks
>> >> have been
>> >> >> created in the Ubuntu CVE tracker:
>> >> >>
>> >> >> * https://github.com/gogo/protobuf
>> >> <https://github.com/gogo/protobuf>:
>> >> >> * https://github.com/hashicorp/consul
>> >> >> <https://github.com/hashicorp/consul>: CVE-2023-0845
>> >> >> * https://github.com/prometheus/prometheus
>> >> >> <https://github.com/prometheus/prometheus>:
>> >> >>
>> >> >> Please review your rock to understand if it is affected by
>> >> these CVEs.
>> >> >>
>> >> >> Thank you for your rock and for attending to this matter.
>> >> >>
>> >> >> References:
>> >> >>
>> >>
>> https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845
>> >> >>
>> >> <
>> https://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-0845>
>> >> >>
>> >> >>
>> >> >>
>> >> >> --
>> >> >> Mailing list: https://launchpad.net/~ubuntu-docker-images
>> >> >> <https://launchpad.net/~ubuntu-docker-images>
>> >> >> Post to : ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx
>> >> >> <mailto:ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx>
>> >> >> Unsubscribe : https://launchpad.net/~ubuntu-docker-images
>> >> >> <https://launchpad.net/~ubuntu-docker-images>
>> >> >> More help : https://help.launchpad.net/ListHelp
>> >> >> <https://help.launchpad.net/ListHelp>
>> >> >>
>> >> >>
>> >> >> --
>> >> >> Cris
>> >>
>> >>
>> >>
>> >> --
>> >> Cris
>>
>
>
> --
> Cris
>
>
--
Cris
Follow ups
References